Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe
Resource
win7-20240215-en
5 signatures
150 seconds
General
-
Target
687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe
-
Size
457KB
-
MD5
687d9f26cea69af9a91bfff8a45ae5d8
-
SHA1
ad99b34dff960946c4cf96857386cc0a21f98777
-
SHA256
a006b2a729dd3b4f3a43745280a48b6d4cc13a249be01b1c885abbf68bfa02d7
-
SHA512
6eb3361ed7c94713cba0b7e9974fdd328ba01933ae8a175ea33c268bb7e1620f64b56503c64c0852305d18e34032e039847e657338beddca88ded40434f49414
-
SSDEEP
6144:Pcm7ImGddXtWrXD486jJq1BStv4Ib1H6I+S:d7Tc9Wj16A3Stvx6I+S
Malware Config
Signatures
-
Detect Blackmoon payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/2260-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2324-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1256-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2384-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2812-326-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-348-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-355-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2380-362-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/732-514-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-540-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-596-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-677-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1496-565-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-334-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-285-0x00000000002B0000-0x00000000002D9000-memory.dmp family_blackmoon behavioral1/memory/2616-284-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1312-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1872-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1500-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1484-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-106-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1776-748-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-938-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1680-1062-0x00000000001B0000-0x00000000001D9000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
btnthn.exevpjjv.exethbhhh.exedddpd.exerxxxlrf.exejddjv.exerffxllx.exetnhhtb.exe1nbhnn.exefflxrxf.exettnthh.exe1bthnt.exehbhhht.exehhtbht.exevdpvp.exe1lrrrlr.exevpjpj.exe3rxlrrl.exejjpvp.exefxxrflx.exehbbhhh.exeddddp.exepjdpd.exebbbthn.exevvjjv.exefllfrlf.exeddddj.exellxfxfx.exehhttbt.exevvvpp.exejdppp.exe5frxrfl.exennbtbh.exeddjpj.exe3fxfxff.exebbbhbb.exehhhhhn.exevvvjv.exelfrflrx.exe5nntht.exevdppd.exellfrlxr.exelfxxrxl.exebthtnt.exeppddj.exellrrrfr.exebttbbh.exe5ddjv.exedjjjp.exelrfflxr.exehthhth.exepjvdv.exerrrlflf.exerrrfrlf.exetntbnb.exe1dvdj.exe7fflrxf.exe7bthtt.exe5hnbth.exepddvp.exefrfxxxl.exeflrxlrr.exebtbnnb.exehbtthb.exepid process 2324 btnthn.exe 2456 vpjjv.exe 1256 thbhhh.exe 2560 dddpd.exe 2524 rxxxlrf.exe 2720 jddjv.exe 2624 rffxllx.exe 2384 tnhhtb.exe 2896 1nbhnn.exe 1856 fflxrxf.exe 2540 ttnthh.exe 2692 1bthnt.exe 1484 hbhhht.exe 1924 hhtbht.exe 1500 vdpvp.exe 2908 1lrrrlr.exe 2460 vpjpj.exe 1872 3rxlrrl.exe 2216 jjpvp.exe 916 fxxrflx.exe 944 hbbhhh.exe 1456 ddddp.exe 1600 pjdpd.exe 3020 bbbthn.exe 2208 vvjjv.exe 1476 fllfrlf.exe 1312 ddddj.exe 1840 llxfxfx.exe 2072 hhttbt.exe 2008 vvvpp.exe 2616 jdppp.exe 984 5frxrfl.exe 1580 nnbtbh.exe 2132 ddjpj.exe 1528 3fxfxff.exe 2992 bbbhbb.exe 2812 hhhhhn.exe 2564 vvvjv.exe 2372 lfrflrx.exe 2516 5nntht.exe 2728 vdppd.exe 3004 llfrlxr.exe 2380 lfxxrxl.exe 2892 bthtnt.exe 2608 ppddj.exe 2376 llrrrfr.exe 2760 bttbbh.exe 2540 5ddjv.exe 1564 djjjp.exe 1880 lrfflxr.exe 1484 hthhth.exe 768 pjvdv.exe 1120 rrrlflf.exe 1420 rrrfrlf.exe 300 tntbnb.exe 2148 1dvdj.exe 1888 7fflrxf.exe 1504 7bthtt.exe 2220 5hnbth.exe 648 pddvp.exe 340 frfxxxl.exe 628 flrxlrr.exe 1416 btbnnb.exe 844 hbtthb.exe -
Processes:
resource yara_rule behavioral1/memory/2260-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2324-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1256-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1256-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2384-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-319-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2812-326-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-348-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-355-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-362-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2376-382-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/732-507-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/732-514-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-540-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-596-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-609-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-628-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-677-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/620-704-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-723-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-565-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1504-458-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-451-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-341-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-334-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-306-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1312-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1872-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1484-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-748-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-780-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-823-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-867-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-886-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-893-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-900-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-938-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-965-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-978-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-997-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/808-1010-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-1053-0x0000000000220000-0x0000000000249000-memory.dmp upx behavioral1/memory/3044-1085-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1200-1101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1672-1126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1580-1133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-1159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-1166-0x00000000003A0000-0x00000000003C9000-memory.dmp upx behavioral1/memory/2516-1186-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exebtnthn.exevpjjv.exethbhhh.exedddpd.exerxxxlrf.exejddjv.exerffxllx.exetnhhtb.exe1nbhnn.exefflxrxf.exettnthh.exe1bthnt.exehbhhht.exehhtbht.exevdpvp.exedescription pid process target process PID 2260 wrote to memory of 2324 2260 687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe btnthn.exe PID 2260 wrote to memory of 2324 2260 687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe btnthn.exe PID 2260 wrote to memory of 2324 2260 687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe btnthn.exe PID 2260 wrote to memory of 2324 2260 687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe btnthn.exe PID 2324 wrote to memory of 2456 2324 btnthn.exe vpjjv.exe PID 2324 wrote to memory of 2456 2324 btnthn.exe vpjjv.exe PID 2324 wrote to memory of 2456 2324 btnthn.exe vpjjv.exe PID 2324 wrote to memory of 2456 2324 btnthn.exe vpjjv.exe PID 2456 wrote to memory of 1256 2456 vpjjv.exe rlllfrx.exe PID 2456 wrote to memory of 1256 2456 vpjjv.exe rlllfrx.exe PID 2456 wrote to memory of 1256 2456 vpjjv.exe rlllfrx.exe PID 2456 wrote to memory of 1256 2456 vpjjv.exe rlllfrx.exe PID 1256 wrote to memory of 2560 1256 thbhhh.exe dddpd.exe PID 1256 wrote to memory of 2560 1256 thbhhh.exe dddpd.exe PID 1256 wrote to memory of 2560 1256 thbhhh.exe dddpd.exe PID 1256 wrote to memory of 2560 1256 thbhhh.exe dddpd.exe PID 2560 wrote to memory of 2524 2560 dddpd.exe rxxxlrf.exe PID 2560 wrote to memory of 2524 2560 dddpd.exe rxxxlrf.exe PID 2560 wrote to memory of 2524 2560 dddpd.exe rxxxlrf.exe PID 2560 wrote to memory of 2524 2560 dddpd.exe rxxxlrf.exe PID 2524 wrote to memory of 2720 2524 rxxxlrf.exe jddjv.exe PID 2524 wrote to memory of 2720 2524 rxxxlrf.exe jddjv.exe PID 2524 wrote to memory of 2720 2524 rxxxlrf.exe jddjv.exe PID 2524 wrote to memory of 2720 2524 rxxxlrf.exe jddjv.exe PID 2720 wrote to memory of 2624 2720 jddjv.exe rffxllx.exe PID 2720 wrote to memory of 2624 2720 jddjv.exe rffxllx.exe PID 2720 wrote to memory of 2624 2720 jddjv.exe rffxllx.exe PID 2720 wrote to memory of 2624 2720 jddjv.exe rffxllx.exe PID 2624 wrote to memory of 2384 2624 rffxllx.exe tnhhtb.exe PID 2624 wrote to memory of 2384 2624 rffxllx.exe tnhhtb.exe PID 2624 wrote to memory of 2384 2624 rffxllx.exe tnhhtb.exe PID 2624 wrote to memory of 2384 2624 rffxllx.exe tnhhtb.exe PID 2384 wrote to memory of 2896 2384 tnhhtb.exe 1nbhnn.exe PID 2384 wrote to memory of 2896 2384 tnhhtb.exe 1nbhnn.exe PID 2384 wrote to memory of 2896 2384 tnhhtb.exe 1nbhnn.exe PID 2384 wrote to memory of 2896 2384 tnhhtb.exe 1nbhnn.exe PID 2896 wrote to memory of 1856 2896 1nbhnn.exe fflxrxf.exe PID 2896 wrote to memory of 1856 2896 1nbhnn.exe fflxrxf.exe PID 2896 wrote to memory of 1856 2896 1nbhnn.exe fflxrxf.exe PID 2896 wrote to memory of 1856 2896 1nbhnn.exe fflxrxf.exe PID 1856 wrote to memory of 2540 1856 fflxrxf.exe ttnthh.exe PID 1856 wrote to memory of 2540 1856 fflxrxf.exe ttnthh.exe PID 1856 wrote to memory of 2540 1856 fflxrxf.exe ttnthh.exe PID 1856 wrote to memory of 2540 1856 fflxrxf.exe ttnthh.exe PID 2540 wrote to memory of 2692 2540 ttnthh.exe 1bthnt.exe PID 2540 wrote to memory of 2692 2540 ttnthh.exe 1bthnt.exe PID 2540 wrote to memory of 2692 2540 ttnthh.exe 1bthnt.exe PID 2540 wrote to memory of 2692 2540 ttnthh.exe 1bthnt.exe PID 2692 wrote to memory of 1484 2692 1bthnt.exe hthhth.exe PID 2692 wrote to memory of 1484 2692 1bthnt.exe hthhth.exe PID 2692 wrote to memory of 1484 2692 1bthnt.exe hthhth.exe PID 2692 wrote to memory of 1484 2692 1bthnt.exe hthhth.exe PID 1484 wrote to memory of 1924 1484 hbhhht.exe hhtbht.exe PID 1484 wrote to memory of 1924 1484 hbhhht.exe hhtbht.exe PID 1484 wrote to memory of 1924 1484 hbhhht.exe hhtbht.exe PID 1484 wrote to memory of 1924 1484 hbhhht.exe hhtbht.exe PID 1924 wrote to memory of 1500 1924 hhtbht.exe vdpvp.exe PID 1924 wrote to memory of 1500 1924 hhtbht.exe vdpvp.exe PID 1924 wrote to memory of 1500 1924 hhtbht.exe vdpvp.exe PID 1924 wrote to memory of 1500 1924 hhtbht.exe vdpvp.exe PID 1500 wrote to memory of 2908 1500 vdpvp.exe 1lrrrlr.exe PID 1500 wrote to memory of 2908 1500 vdpvp.exe 1lrrrlr.exe PID 1500 wrote to memory of 2908 1500 vdpvp.exe 1lrrrlr.exe PID 1500 wrote to memory of 2908 1500 vdpvp.exe 1lrrrlr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\687d9f26cea69af9a91bfff8a45ae5d8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\btnthn.exec:\btnthn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpjjv.exec:\vpjjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thbhhh.exec:\thbhhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddpd.exec:\dddpd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxxlrf.exec:\rxxxlrf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddjv.exec:\jddjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rffxllx.exec:\rffxllx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnhhtb.exec:\tnhhtb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1nbhnn.exec:\1nbhnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fflxrxf.exec:\fflxrxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttnthh.exec:\ttnthh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1bthnt.exec:\1bthnt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhhht.exec:\hbhhht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhtbht.exec:\hhtbht.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdpvp.exec:\vdpvp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1lrrrlr.exec:\1lrrrlr.exe17⤵
- Executes dropped EXE
-
\??\c:\vpjpj.exec:\vpjpj.exe18⤵
- Executes dropped EXE
-
\??\c:\3rxlrrl.exec:\3rxlrrl.exe19⤵
- Executes dropped EXE
-
\??\c:\jjpvp.exec:\jjpvp.exe20⤵
- Executes dropped EXE
-
\??\c:\fxxrflx.exec:\fxxrflx.exe21⤵
- Executes dropped EXE
-
\??\c:\hbbhhh.exec:\hbbhhh.exe22⤵
- Executes dropped EXE
-
\??\c:\ddddp.exec:\ddddp.exe23⤵
- Executes dropped EXE
-
\??\c:\pjdpd.exec:\pjdpd.exe24⤵
- Executes dropped EXE
-
\??\c:\bbbthn.exec:\bbbthn.exe25⤵
- Executes dropped EXE
-
\??\c:\vvjjv.exec:\vvjjv.exe26⤵
- Executes dropped EXE
-
\??\c:\fllfrlf.exec:\fllfrlf.exe27⤵
- Executes dropped EXE
-
\??\c:\ddddj.exec:\ddddj.exe28⤵
- Executes dropped EXE
-
\??\c:\llxfxfx.exec:\llxfxfx.exe29⤵
- Executes dropped EXE
-
\??\c:\hhttbt.exec:\hhttbt.exe30⤵
- Executes dropped EXE
-
\??\c:\vvvpp.exec:\vvvpp.exe31⤵
- Executes dropped EXE
-
\??\c:\jdppp.exec:\jdppp.exe32⤵
- Executes dropped EXE
-
\??\c:\5frxrfl.exec:\5frxrfl.exe33⤵
- Executes dropped EXE
-
\??\c:\nnbtbh.exec:\nnbtbh.exe34⤵
- Executes dropped EXE
-
\??\c:\ddjpj.exec:\ddjpj.exe35⤵
- Executes dropped EXE
-
\??\c:\3fxfxff.exec:\3fxfxff.exe36⤵
- Executes dropped EXE
-
\??\c:\bbbhbb.exec:\bbbhbb.exe37⤵
- Executes dropped EXE
-
\??\c:\hhhhhn.exec:\hhhhhn.exe38⤵
- Executes dropped EXE
-
\??\c:\vvvjv.exec:\vvvjv.exe39⤵
- Executes dropped EXE
-
\??\c:\lfrflrx.exec:\lfrflrx.exe40⤵
- Executes dropped EXE
-
\??\c:\5nntht.exec:\5nntht.exe41⤵
- Executes dropped EXE
-
\??\c:\vdppd.exec:\vdppd.exe42⤵
- Executes dropped EXE
-
\??\c:\llfrlxr.exec:\llfrlxr.exe43⤵
- Executes dropped EXE
-
\??\c:\lfxxrxl.exec:\lfxxrxl.exe44⤵
- Executes dropped EXE
-
\??\c:\bthtnt.exec:\bthtnt.exe45⤵
- Executes dropped EXE
-
\??\c:\ppddj.exec:\ppddj.exe46⤵
- Executes dropped EXE
-
\??\c:\llrrrfr.exec:\llrrrfr.exe47⤵
- Executes dropped EXE
-
\??\c:\bttbbh.exec:\bttbbh.exe48⤵
- Executes dropped EXE
-
\??\c:\5ddjv.exec:\5ddjv.exe49⤵
- Executes dropped EXE
-
\??\c:\djjjp.exec:\djjjp.exe50⤵
- Executes dropped EXE
-
\??\c:\lrfflxr.exec:\lrfflxr.exe51⤵
- Executes dropped EXE
-
\??\c:\hthhth.exec:\hthhth.exe52⤵
- Executes dropped EXE
-
\??\c:\pjvdv.exec:\pjvdv.exe53⤵
- Executes dropped EXE
-
\??\c:\rrrlflf.exec:\rrrlflf.exe54⤵
- Executes dropped EXE
-
\??\c:\rrrfrlf.exec:\rrrfrlf.exe55⤵
- Executes dropped EXE
-
\??\c:\tntbnb.exec:\tntbnb.exe56⤵
- Executes dropped EXE
-
\??\c:\1dvdj.exec:\1dvdj.exe57⤵
- Executes dropped EXE
-
\??\c:\7fflrxf.exec:\7fflrxf.exe58⤵
- Executes dropped EXE
-
\??\c:\7bthtt.exec:\7bthtt.exe59⤵
- Executes dropped EXE
-
\??\c:\5hnbth.exec:\5hnbth.exe60⤵
- Executes dropped EXE
-
\??\c:\pddvp.exec:\pddvp.exe61⤵
- Executes dropped EXE
-
\??\c:\frfxxxl.exec:\frfxxxl.exe62⤵
- Executes dropped EXE
-
\??\c:\flrxlrr.exec:\flrxlrr.exe63⤵
- Executes dropped EXE
-
\??\c:\btbnnb.exec:\btbnnb.exe64⤵
- Executes dropped EXE
-
\??\c:\hbtthb.exec:\hbtthb.exe65⤵
- Executes dropped EXE
-
\??\c:\vjpdv.exec:\vjpdv.exe66⤵
-
\??\c:\9frflfx.exec:\9frflfx.exe67⤵
-
\??\c:\tbnbhn.exec:\tbnbhn.exe68⤵
-
\??\c:\vjvpj.exec:\vjvpj.exe69⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe70⤵
-
\??\c:\xrxxflr.exec:\xrxxflr.exe71⤵
-
\??\c:\nnbbnn.exec:\nnbbnn.exe72⤵
-
\??\c:\7djdd.exec:\7djdd.exe73⤵
-
\??\c:\dpdpd.exec:\dpdpd.exe74⤵
-
\??\c:\fxllrrf.exec:\fxllrrf.exe75⤵
-
\??\c:\hhbthn.exec:\hhbthn.exe76⤵
-
\??\c:\djdvp.exec:\djdvp.exe77⤵
-
\??\c:\pppvd.exec:\pppvd.exe78⤵
-
\??\c:\lrxxlxf.exec:\lrxxlxf.exe79⤵
-
\??\c:\5hthnb.exec:\5hthnb.exe80⤵
-
\??\c:\ppvvv.exec:\ppvvv.exe81⤵
-
\??\c:\rlllfrx.exec:\rlllfrx.exe82⤵
-
\??\c:\fxffxxl.exec:\fxffxxl.exe83⤵
-
\??\c:\bbbhbb.exec:\bbbhbb.exe84⤵
-
\??\c:\vvdvj.exec:\vvdvj.exe85⤵
-
\??\c:\lrffffl.exec:\lrffffl.exe86⤵
-
\??\c:\9flrfrf.exec:\9flrfrf.exe87⤵
-
\??\c:\ttbntt.exec:\ttbntt.exe88⤵
-
\??\c:\vdjvj.exec:\vdjvj.exe89⤵
-
\??\c:\jdvjj.exec:\jdvjj.exe90⤵
-
\??\c:\rfrlllx.exec:\rfrlllx.exe91⤵
-
\??\c:\thtbtb.exec:\thtbtb.exe92⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe93⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe94⤵
-
\??\c:\flxllxf.exec:\flxllxf.exe95⤵
-
\??\c:\hhbbbb.exec:\hhbbbb.exe96⤵
-
\??\c:\9dvvd.exec:\9dvvd.exe97⤵
-
\??\c:\frxllrl.exec:\frxllrl.exe98⤵
-
\??\c:\lxxllll.exec:\lxxllll.exe99⤵
-
\??\c:\ttnnnb.exec:\ttnnnb.exe100⤵
-
\??\c:\pjpjj.exec:\pjpjj.exe101⤵
-
\??\c:\jjjdp.exec:\jjjdp.exe102⤵
-
\??\c:\lfxxfxx.exec:\lfxxfxx.exe103⤵
-
\??\c:\ffxfrxr.exec:\ffxfrxr.exe104⤵
-
\??\c:\tbhnbn.exec:\tbhnbn.exe105⤵
-
\??\c:\fxrfrxf.exec:\fxrfrxf.exe106⤵
-
\??\c:\bbtnbt.exec:\bbtnbt.exe107⤵
-
\??\c:\nhtthh.exec:\nhtthh.exe108⤵
-
\??\c:\1xxfrxf.exec:\1xxfrxf.exe109⤵
-
\??\c:\nbhbhh.exec:\nbhbhh.exe110⤵
-
\??\c:\vpddp.exec:\vpddp.exe111⤵
-
\??\c:\tnbtnn.exec:\tnbtnn.exe112⤵
-
\??\c:\jjpvd.exec:\jjpvd.exe113⤵
-
\??\c:\7rfxlrl.exec:\7rfxlrl.exe114⤵
-
\??\c:\9pdvv.exec:\9pdvv.exe115⤵
-
\??\c:\flxxrlr.exec:\flxxrlr.exe116⤵
-
\??\c:\jjvdd.exec:\jjvdd.exe117⤵
-
\??\c:\flxrxrl.exec:\flxrxrl.exe118⤵
-
\??\c:\fflrfrx.exec:\fflrfrx.exe119⤵
-
\??\c:\vppvv.exec:\vppvv.exe120⤵
-
\??\c:\9fxrxrf.exec:\9fxrxrf.exe121⤵
-
\??\c:\tbhtbb.exec:\tbhtbb.exe122⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe123⤵
-
\??\c:\7lxlrxf.exec:\7lxlrxf.exe124⤵
-
\??\c:\pddvd.exec:\pddvd.exe125⤵
-
\??\c:\5rfxxlr.exec:\5rfxxlr.exe126⤵
-
\??\c:\ttnnth.exec:\ttnnth.exe127⤵
-
\??\c:\1vjpv.exec:\1vjpv.exe128⤵
-
\??\c:\9nbbbh.exec:\9nbbbh.exe129⤵
-
\??\c:\vpjjj.exec:\vpjjj.exe130⤵
-
\??\c:\fxlfrrl.exec:\fxlfrrl.exe131⤵
-
\??\c:\nnnnhb.exec:\nnnnhb.exe132⤵
-
\??\c:\dppvd.exec:\dppvd.exe133⤵
-
\??\c:\9tnthn.exec:\9tnthn.exe134⤵
-
\??\c:\bhbbbh.exec:\bhbbbh.exe135⤵
-
\??\c:\rrrrlrf.exec:\rrrrlrf.exe136⤵
-
\??\c:\nnbnbh.exec:\nnbnbh.exe137⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe138⤵
-
\??\c:\xrrllxr.exec:\xrrllxr.exe139⤵
-
\??\c:\hhbbnh.exec:\hhbbnh.exe140⤵
-
\??\c:\7jppd.exec:\7jppd.exe141⤵
-
\??\c:\rlxxrxf.exec:\rlxxrxf.exe142⤵
-
\??\c:\3bhhnn.exec:\3bhhnn.exe143⤵
-
\??\c:\dpddp.exec:\dpddp.exe144⤵
-
\??\c:\xllfflx.exec:\xllfflx.exe145⤵
-
\??\c:\lllrfxl.exec:\lllrfxl.exe146⤵
-
\??\c:\btnttb.exec:\btnttb.exe147⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe148⤵
-
\??\c:\9xlrfrl.exec:\9xlrfrl.exe149⤵
-
\??\c:\nnnnbt.exec:\nnnnbt.exe150⤵
-
\??\c:\htnbbb.exec:\htnbbb.exe151⤵
-
\??\c:\ppjpj.exec:\ppjpj.exe152⤵
-
\??\c:\llfrxrl.exec:\llfrxrl.exe153⤵
-
\??\c:\bbhtnh.exec:\bbhtnh.exe154⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe155⤵
-
\??\c:\frrxfxf.exec:\frrxfxf.exe156⤵
-
\??\c:\tttbht.exec:\tttbht.exe157⤵
-
\??\c:\ppppv.exec:\ppppv.exe158⤵
-
\??\c:\vpjjv.exec:\vpjjv.exe159⤵
-
\??\c:\tnbbnt.exec:\tnbbnt.exe160⤵
-
\??\c:\vjdvd.exec:\vjdvd.exe161⤵
-
\??\c:\3djdj.exec:\3djdj.exe162⤵
-
\??\c:\ffflrxl.exec:\ffflrxl.exe163⤵
-
\??\c:\5nbhht.exec:\5nbhht.exe164⤵
-
\??\c:\dpjdv.exec:\dpjdv.exe165⤵
-
\??\c:\lfxxfrr.exec:\lfxxfrr.exe166⤵
-
\??\c:\hhbbhh.exec:\hhbbhh.exe167⤵
-
\??\c:\jvjpp.exec:\jvjpp.exe168⤵
-
\??\c:\flfllrf.exec:\flfllrf.exe169⤵
-
\??\c:\htnntb.exec:\htnntb.exe170⤵
-
\??\c:\jjvvd.exec:\jjvvd.exe171⤵
-
\??\c:\3llxllr.exec:\3llxllr.exe172⤵
-
\??\c:\rfrrrff.exec:\rfrrrff.exe173⤵
-
\??\c:\5tbtbh.exec:\5tbtbh.exe174⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe175⤵
-
\??\c:\9lflxxx.exec:\9lflxxx.exe176⤵
-
\??\c:\bbthtt.exec:\bbthtt.exe177⤵
-
\??\c:\dvvdd.exec:\dvvdd.exe178⤵
-
\??\c:\rrxxxfx.exec:\rrxxxfx.exe179⤵
-
\??\c:\bbtnht.exec:\bbtnht.exe180⤵
-
\??\c:\ppdvv.exec:\ppdvv.exe181⤵
-
\??\c:\rrfxxrl.exec:\rrfxxrl.exe182⤵
-
\??\c:\nnhtbh.exec:\nnhtbh.exe183⤵
-
\??\c:\pppvv.exec:\pppvv.exe184⤵
-
\??\c:\1lflxxl.exec:\1lflxxl.exe185⤵
-
\??\c:\3hhntt.exec:\3hhntt.exe186⤵
-
\??\c:\vjjjv.exec:\vjjjv.exe187⤵
-
\??\c:\llrxxrf.exec:\llrxxrf.exe188⤵
-
\??\c:\hhnbnt.exec:\hhnbnt.exe189⤵
-
\??\c:\ffxrrlx.exec:\ffxrrlx.exe190⤵
-
\??\c:\bhttbt.exec:\bhttbt.exe191⤵
-
\??\c:\dvdpj.exec:\dvdpj.exe192⤵
-
\??\c:\fxllrfr.exec:\fxllrfr.exe193⤵
-
\??\c:\ttbnnb.exec:\ttbnnb.exe194⤵
-
\??\c:\hbbhhn.exec:\hbbhhn.exe195⤵
-
\??\c:\ddjjp.exec:\ddjjp.exe196⤵
-
\??\c:\lrxxffl.exec:\lrxxffl.exe197⤵
-
\??\c:\hnbthb.exec:\hnbthb.exe198⤵
-
\??\c:\pjpvv.exec:\pjpvv.exe199⤵
-
\??\c:\xxrlfrl.exec:\xxrlfrl.exe200⤵
-
\??\c:\5tbtth.exec:\5tbtth.exe201⤵
-
\??\c:\hhntbb.exec:\hhntbb.exe202⤵
-
\??\c:\vpvvd.exec:\vpvvd.exe203⤵
-
\??\c:\frfrlll.exec:\frfrlll.exe204⤵
-
\??\c:\hbtnnh.exec:\hbtnnh.exe205⤵
-
\??\c:\ddddv.exec:\ddddv.exe206⤵
-
\??\c:\vdjjd.exec:\vdjjd.exe207⤵
-
\??\c:\rffrxxr.exec:\rffrxxr.exe208⤵
-
\??\c:\5thtbb.exec:\5thtbb.exe209⤵
-
\??\c:\vvppj.exec:\vvppj.exe210⤵
-
\??\c:\3flrlff.exec:\3flrlff.exe211⤵
-
\??\c:\nbtntn.exec:\nbtntn.exe212⤵
-
\??\c:\dpvdv.exec:\dpvdv.exe213⤵
-
\??\c:\1pdpv.exec:\1pdpv.exe214⤵
-
\??\c:\xxxxllf.exec:\xxxxllf.exe215⤵
-
\??\c:\tnbbnb.exec:\tnbbnb.exe216⤵
-
\??\c:\dpjjj.exec:\dpjjj.exe217⤵
-
\??\c:\dpjjp.exec:\dpjjp.exe218⤵
-
\??\c:\rlflflr.exec:\rlflflr.exe219⤵
-
\??\c:\bttthn.exec:\bttthn.exe220⤵
-
\??\c:\djdjp.exec:\djdjp.exe221⤵
-
\??\c:\lffrxrx.exec:\lffrxrx.exe222⤵
-
\??\c:\htbntt.exec:\htbntt.exe223⤵
-
\??\c:\pjpvj.exec:\pjpvj.exe224⤵
-
\??\c:\rfffrxr.exec:\rfffrxr.exe225⤵
-
\??\c:\hhbhbh.exec:\hhbhbh.exe226⤵
-
\??\c:\thtbbb.exec:\thtbbb.exe227⤵
-
\??\c:\jvpjd.exec:\jvpjd.exe228⤵
-
\??\c:\xrlrlrf.exec:\xrlrlrf.exe229⤵
-
\??\c:\nnhnbn.exec:\nnhnbn.exe230⤵
-
\??\c:\pjjvj.exec:\pjjvj.exe231⤵
-
\??\c:\llfrflf.exec:\llfrflf.exe232⤵
-
\??\c:\5bttnt.exec:\5bttnt.exe233⤵
-
\??\c:\dddjj.exec:\dddjj.exe234⤵
-
\??\c:\7hthht.exec:\7hthht.exe235⤵
-
\??\c:\7jdpv.exec:\7jdpv.exe236⤵
-
\??\c:\tbthtb.exec:\tbthtb.exe237⤵
-
\??\c:\vjvvp.exec:\vjvvp.exe238⤵
-
\??\c:\ddjpv.exec:\ddjpv.exe239⤵
-
\??\c:\lfxlflf.exec:\lfxlflf.exe240⤵
-
\??\c:\hnttnn.exec:\hnttnn.exe241⤵